Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-01-2025 15:00
General
-
Target
Payload.exe
-
Size
71KB
-
MD5
112ce9e770c7245e9b37f52c0ef34563
-
SHA1
a5a7dedbc4aacf24398231da2cdbe0325f4ed869
-
SHA256
a5b394f5780d1c2f5c006d482a2016de8000fbd334f925cdeb349ea0f863018e
-
SHA512
c3b5a32beaaae9bf044ee6a7552cf2a765b1efb0d7688c367d486e1b341564b8b940628b726115631c0e81d26c08995893176e78c1a68a1282a4c9c70849dba3
-
SSDEEP
1536:EeFWPsHAE8oFS3q6bUZf5f2F0iZOa9sIftOShT04GNrztiBVXiKMt9PMrPaF9baf:Bs6fFIfHT04xX/q9P8aF9ba
Malware Config
Extracted
Family
njrat
Version
Platinum
Botnet
Victim
C2
http://burhanalassad.site/KING:963
Mutex
svchost.exe
Attributes
-
reg_key
svchost.exe
-
splitter
|Ghost|
Signatures
-
Njrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe Token: 33 4852 Payload.exe Token: SeIncBasePriorityPrivilege 4852 Payload.exe